How training can help identify hackers, hacktivists and trusted insiders that threaten every stroke of the keyboard.

Now join Eric as he uses real-life spy stories to show how careful diligence, counter espionage techniques and top-notch training can help identify the numerous spies, hackers, hacktivists and trusted insiders that threaten every stroke of the keyboard.